Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Hash Function Design Strategy Called SMASH., , , and . IEEE Trans. Inf. Theory, 54 (8): 3647-3655 (2008)Improved Meet-in-the-Middle Cryptanalysis of KTANTAN., , , , , and . IACR Cryptol. ePrint Arch., (2011)Revisiting Gilbert's known-key distinguisher., and . Des. Codes Cryptogr., 88 (7): 1401-1445 (2020)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . IACR Cryptology ePrint Archive, (2007)Practical Attacks on AES-like Cryptographic Hash Functions., and . LATINCRYPT, volume 8895 of Lecture Notes in Computer Science, page 259-273. Springer, (2014)Second-Preimage Analysis of Reduced SHA-1.. ACISP, volume 6168 of Lecture Notes in Computer Science, page 104-116. Springer, (2010)Second Preimages for SMASH., , , and . CT-RSA, volume 4377 of Lecture Notes in Computer Science, page 101-111. Springer, (2007)Rotational Rebound Attacks on Reduced Skein., , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 1-19. Springer, (2010)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)Efficient FPGA Implementations of LowMC and Picnic., , , , and . IACR Cryptology ePrint Archive, (2019)